Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7329: CWE-306 Missing Authentication for Critical Function in tinycontrol Lan Controller

0
High
VulnerabilityCVE-2023-7329cvecve-2023-7329cwe-306
Published: Wed Nov 12 2025 (11/12/2025, 22:06:26 UTC)
Source: CVE Database V5
Vendor/Project: tinycontrol
Product: Lan Controller

Description

Tinycontrol LAN Controller v3 (LK3) firmware versions up to 1.58a (hardware v3.8) contain a missing authentication vulnerability in the stm.cgi endpoint. A remote, unauthenticated attacker can send crafted requests to forcibly reboot the device or restore factory settings, leading to a denial of service and configuration loss.

AI-Powered Analysis

AILast updated: 11/12/2025, 22:31:40 UTC

Technical Analysis

The vulnerability identified as CVE-2023-7329 affects tinycontrol LAN Controller version 3 (hardware v3.8) firmware up to 1.58a. It is classified under CWE-306, indicating missing authentication for a critical function. Specifically, the stm.cgi endpoint in the device's firmware does not require authentication, allowing any remote attacker to send crafted HTTP requests without credentials. These requests can forcibly reboot the device or restore it to factory default settings. This leads to a denial of service (DoS) condition by interrupting device availability and causing loss of any customized configurations, which may disrupt network management and control functions relying on these devices. The vulnerability is remotely exploitable over the network without any privileges or user interaction, increasing the risk of automated or mass exploitation. Although no public exploits have been reported yet, the CVSS 4.0 base score is 8.7, reflecting the critical nature of the impact on availability and integrity. The lack of authentication on a management endpoint is a fundamental security flaw, exposing the device to potential attacks from any network segment with access. The absence of patches at the time of reporting necessitates alternative mitigations to protect affected devices.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on tinycontrol LAN Controllers for network management, industrial control, or building automation. A successful attack can cause unexpected device reboots or factory resets, leading to network outages, loss of configuration settings, and potential operational downtime. This disruption could affect critical infrastructure sectors such as manufacturing, utilities, and smart building environments, where these controllers are deployed. The loss of configuration may require manual reconfiguration, increasing operational costs and downtime. Additionally, the denial of service could be leveraged as part of a larger attack campaign to degrade network reliability or as a distraction while other attacks are conducted. The lack of authentication means that attackers do not need insider access or credentials, broadening the attack surface. European entities with stringent uptime and availability requirements may face compliance and reputational risks if such disruptions occur.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. First, restrict network access to the tinycontrol LAN Controller management interfaces by placing them behind firewalls or network segmentation controls, allowing only trusted administrative hosts to communicate with the device. Employ VPNs or secure tunnels for remote management to prevent unauthorized access. Monitor network traffic for unusual requests targeting the stm.cgi endpoint and implement intrusion detection/prevention systems (IDS/IPS) rules to block suspicious activity. Maintain regular backups of device configurations to enable rapid restoration if a factory reset occurs. Engage with the vendor to obtain firmware updates or security advisories and apply patches promptly once released. Additionally, review and harden device configurations and consider disabling unnecessary management interfaces if possible. Conduct regular security assessments of network devices to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-11-12T21:06:12.202Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691509abe6b3e50d509f11c4

Added to database: 11/12/2025, 10:26:51 PM

Last enriched: 11/12/2025, 10:31:40 PM

Last updated: 11/12/2025, 11:33:23 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats